Regarding Easy Beaver 0.9.3, it is interesting that Xorg now defaults to using the modesetting driver, not the intel driver (when your PC has intel video). I did see a post about that somewhere.

You would have to run the Xorg Wizard to change to the intel driver.

scsijon sent me an email, the 4.18.8 kernel has a security flaw. I am compiling 4.18.9 right now.

There was another email with some bug reports, one of them was that the youtube downloader doesn't work. Will check that out. Looks like a bugfix release is coming very soon!

Note about youtube downloader, it uses youtube-dl, which is a perl (python?) script. It has to be upgraded every now and again, as youtube.com people move the goal posts, to foil downloaders._________________http://bkhome.org/news/

Didn't have a Easy to hand, so had to extract the BOOT_SPECS old-school style. fdisk -l for the nix I was running didn't show DiskID either so had to resort to lsblk -O. Even then I messed it up by not duplicating the UUID in the two entries (and nearly forgot to add the trailing slash on the paths (but seem to recall that might no longer be a necessity).

Great choices available in the extensive repo's.

Containered Seamonkey was slowish to load, recompressed the sfs and much better. Does still seem to have some juttery performance at times, maybe the newer kernel isn't so good on my 10 years old Phenom X4 (maybe I just need to tweak some things).

Boy, to get to the containers seamonkey UserChrome.css to tweak to a larger font ... buried so deed.

Love the containerisation. I'm now running with data on a pure OpenBSD base system (old single core) box, that reverse sshfs mounts one of its folders, no inbound originated accepted so secure - excepting the data folder content that is presented via sshfs. With main Easy B' acting as the manager, browser running in refreshed containers, sshfs mount my android phone - a very nice combination

As I'm typing this (with Miss Monique video playing in the background), I am getting key stutters. Relatively frequently - type a few letters and the cursor/screen lags behind maybe for a few letters before presenting them in a single update type behaviour.

Trying another post after having reverted back to a clean seamonkey container snapshot (I've also copied across the hosts (pup ad block) file from the main session into the seamonkey container's /etc/host file - before making another 'clean' seamonkey container snapshot) and without youtube playing - text entry is nice/normal (responsive)._________________( ͡° ͜ʖ ͡°)﻿ :wqFatdog multi-session usbecho url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|sh

Barry, I've come across f2fs in the latest set of kernel fixes and wonder if it could be at least added to the kernel config for testing and comparison please when you build the kernel next.

F2FS 's origons are back in 3.8 in 2012 and is designed to build a linux filesystem that, from the start, takes into account the characteristics of flash memory-based storage devices. Nowadays it includes such devices as solid-state disks, eMMC, and SD cards, which are being widely used in systems ranging from embeded mobile devices through to large scale server farms.

It was origonally a Samsung package with Jaegeuk Kim being the principal F2FS author so it's not a quick-lifespan filesystem as some have been.

It seems to be on par with ufs for us, with the only problem at present for us being that currently it's not grub compatable, which is why I only ask for testing not release.

People like Greg Kroah-Hartman (linux-foundation) and Sasha Levin (think microsoft's top filesystem person) are also directly involved so it's got some backing after six years.Last edited by scsijon on Fri 21 Sep 2018, 19:26; edited 1 time in total

Easy B' 0.9.4. Run desk0 container. Use jwm desk manager to make some changes (that typically executes jwm -restart), and duplicate sound, free space and temperature icons appear in the tray. Exiting and re-entering the desk0 container resets them to single entries again and they don't seem to be saved in a snapshot._________________( ͡° ͜ʖ ͡°)﻿ :wqFatdog multi-session usbecho url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|shLast edited by rufwoof on Sat 22 Sep 2018, 05:21; edited 1 time in total

If you already have 0.9.3 installed, it is very easy to upgrade. I tested on my flash-stick -- just copied the new 'vmlinuz', 'q.sfs' and 'initrd.q' to the first partition of the flash stick, then rebooted.

It is a manual procedure, but very simple. Described in more detail here:

As I'm typing this (with Miss Monique video playing in the background), I am getting key stutters. Relatively frequently - type a few letters and the cursor/screen lags behind maybe for a few letters before presenting them in a single update type behaviour.

Loaded the desk0 container and used ppm to install mpv inside that container. Running it and it also jutters. CPU load is low, so looks like its a graphical/piping issue - likely due to two sets of X running (main session and containers).

The containers based on sfs layering is a great concept. Same main sfs at the bottom, different save folders on top of that. Wondering about if the main session was cli only, a container manager and secure area inaccessible by each container. If a desktop/X container was then run from that (xwin), then that would be the only X server running and should run well - as good as the current normal/main X desktop.

I like tmux and mc as my cli/console setup, nice and colourful/looks reasonable. Perhaps still the exact same main sfs (q.sfs) utilised, but just boots to cli no X loaded (noX or whatever boot parameter), and then a ec-chroot xwin file to start up a containered X session._________________( ͡° ͜ʖ ͡°)﻿ :wqFatdog multi-session usbecho url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|sh

From a security perspective - you can read/write to the main sessions tty2 (for instance), i.e. console, from within desk0 (container). So a hacked desk0 session could conceptually monitor any userid/passwords that you might enter via ctrl-alt-fn switching to another console.

Options to address that might be to restrict containers to not be run under a non-root userid (and not permitted root access) as the /dev/ttyx that you log in with takes on the ownership of that userid (login with rover for instance on tty2 and /dev/tty2 becomes owned by rover, no one else can rw to that (except root)).

OR (the more viable) ...

Just avoid logging into other console sessions (using ctrl-alt-F2 or whatever).

Best practice is perhaps to never enter any passwords, in X or even at the console. Auto login and using keys for ssh/sshfs/whatever means you only ever have to protect the private keys. For online passwords, such as logging into the Puppy Forum, just be aware that your userid/password could be stolen/observed (just as it could be stolen/observed via penetrating the Forum web site). Use low limit/value cards for any online purchases. For banking boot pristine OS, pristine browser and go direct to your banks web site with that, nowhere else before or after (cold/hard reboot before and after).

Extreme paranoia 'good practice' could be to initially set up the main desktop as you like it (configure locale etc.) and make a snapshot of that. Then setup desk0 container as you like it without going on line, and make a snapshot of that. Then start the desk0 container, open the browser and browse to one site, and afterwards restore the desk0 snapshot, restore the main session snapshot, and hard/cold reboot and start again for the next web site ..etc. Ensuring not to do any root/admin tasks/activities whilst desk0 is loaded. Even then however, despite a fresh OS and fresh browser to visit each web site in a attempt to eliminate cross site hacking of passwords etc. a man in the middle (your dns perhaps hacked) could still facilitate capture of multiple site login userid/passwords. I'm really just stressing here that no matter what you might do security is never foolproof and your best stance is to assume that whatever you do use/enter could be insecure so consider and adopt practices accordingly. George R. R. Martin for instance (Game of Thrones) uses a DOS box that isn't connected the internet to do/store his writings and another box for surfing. Fundamentally securing data is a lot more viable than is securing online activities against identity theft. Of those two the latter is more often the more valuable for hackers such as Google Whilst G stay within the law, others who operate outside of the law can cause immense hurt - identity theft can prolong for years, even decades (involving court cases, bailiffs (some of which border on being criminals themselves in the level of fees they add on to claims when they do knock your door with a assets seizure court order) etc.)._________________( ͡° ͜ʖ ͡°)﻿ :wqFatdog multi-session usbecho url|sed -e 's/^/(c/' -e 's/$/ hashbang.sh)/'|sh

Raspberry Pi is not restarting. i.e. switch off required. Another issue desktop just 680x480 pixel as against full HD monitor (21 Inch). Once it was display wast Full HD display. After r that no full desktop display. RP3 little slow compared to Raspbian.

Easy OS Beaver 0.9.4( X64 Bit Desktop) not booting to desktop due to some technical problem. I have made several restart wth xwin, xorgwizard. still not desktop.

They are labelled as 'run' on the RPi3, but you can access the same functions from the GPIO or intercept the power socket. Actually, 'run' is a hard reset function like a DT-PC. With Pi you have to do a bit of HW as well as SW!

You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot vote in polls in this forumYou cannot attach files in this forumYou can download files in this forum